摘要:
A method for security for inter-RAT carrier aggregation is disclosed. The method includes encrypting a message using an encryption technique for a first RAT. The method also includes sending, to a UE, at least a portion of the encrypted message using a different, second RAT. Sending using the second RAT does not further encrypt the at least a portion of the encrypted message. The method further includes receiving the at least a portion of the message encrypted using the first RAT protocol. Receiving uses the second, different RAT. The method also includes decrypting the at least a portion of the message using the first RAT protocol. Apparatus and computer readable media are also described.
摘要:
A method for security for inter-RAT carrier aggregation is disclosed. The method includes encrypting a message using an encryption technique for a first RAT. The method also includes sending, to a UE, at least a portion of the encrypted message using a different, second RAT. Sending using the second RAT does not further encrypt the at least a portion of the encrypted message. The method further includes receiving the at least a portion of the message encrypted using the first RAT protocol. Receiving uses the second, different RAT. The method also includes decrypting the at least a portion of the message using the first RAT protocol. Apparatus and computer readable media are also described.
摘要:
A system for facilitating communal apparatus interaction. In accordance with at least one embodiment of the present invention, an apparatus configured to communicate on a wireless channel may receive first information pertaining to wireless traffic expected from other networks also utilizing the wireless channel. The apparatus may then determine whether the received information satisfies a first criterion, and if it is determined that the first information satisfies the first criterion, the apparatus may shorten an awake window duration for communicating on the wireless channel. Alternatively, if it is determined that the information does not satisfy the first criterion, the apparatus may proceed to further determine whether second information pertaining to wireless traffic on the wireless channel that is expected from a network satisfies a second criterion. If it is determined that the second information satisfies the second criterion, the apparatus may proceed to lengthen the awake window duration.
摘要:
Systems and techniques for wireless communication. A user device belonging to a group of user devices that may operate as wireless nodes configures a locale parameter based on its sensing of a radio channel. The locale parameter is included in a message readable by members of the group. A group member receiving a message determines a locale parameter based on its own sensing of a radio channel and responds to a received message only if the locale parameter in the message matches the locale parameter based on the sensing of the radio channel by the receiving member within specified bounds.
摘要:
Methods and systems for managing access to a wireless local area network are provided. A wireless access point (AP) may use a unified approach that utilizes an out-of-band channel to communicate authentication key and network address information to a guest device, and utilizes an in-band channel to establish communications with the guest device, and also provides support for in-band setup on all devices. The ability to use out-of-band where possible provides for an increase to security and usability, and the possibility of delegating access from one device to another. The unified approach thereby also provides easy management of guest access to the WLAN.
摘要:
An apparatus for authentication of fragments using hash trees may include a processor. The processor may be configured to provide one or more data fragments and a hash tree representing the one or more fragments, send at least one first fragment accompanied by any nodes of the hash tree necessary to authenticate the one or more first sent fragments, and send one or more subsequent fragments accompanied by only some, but not all, of the nodes of the hash tree necessary to authenticate the one or more subsequent fragments with the other nodes that are not sent but are necessary for authentication having been previously sent in conjunction with a prior fragment.
摘要:
An approach is provided for selecting devices to form a community. A network manager determines one or more candidate devices within proximity of at least one device. Next, the network manager determines to initiate at least one synchronized capture of sensor data by the at least one device and at least one of the one or more candidate devices. Then, the network manager determines to form the community based, at least in part, on the at least one synchronized capture.
摘要:
Methods and systems for managing access to a wireless local area network are provided. A wireless access point (AP) may use a unified approach that utilizes an out-of-band channel to communicate authentication key and network address information to a guest device, and utilizes an in-band channel to establish communications with the guest device, and also provides support for in-band setup on all devices. The ability to use out-of-band where possible provides for an increase to security and usability, and the possibility of delegating access from one device to another. The unified approach thereby also provides easy management of guest access to the WLAN.
摘要:
A system, method, electronic device, module, and computer code product for communicating service information between an electronic device and a remote control point using an out-of-band discovery mechanism. An electronic device includes a memory unit, a processor operatively connected to the memory unit, and a data communication link for enabling communication within a network. The memory unit includes computer code for using an out-of-band discovery mechanism to provide service information to a remote control point through the data communication link.
摘要:
A method for requesting a certificate from a certificate issuer for a public key that is associated with a corresponding private key stored by a storing entity, the method comprising: generating by means of a generating entity a certificate request message indicative of a request for a certificate; and transmitting the certificate request message to the certificate issuer; the certificate request message including an indication of the relationship between the storing entity and the generating entity.